A comprehensive guide to the NIST cybersecurity framework 2.0: strategies, implementation, and best practice (Record no. 1603)

MARC details
000 -LEADER
fixed length control field 02655nam a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250714122427.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250714b2025|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781394280384
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.8
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Edwards, Jason
Relator term Author
245 ## - TITLE STATEMENT
Title A comprehensive guide to the NIST cybersecurity framework 2.0: strategies, implementation, and best practice
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New York:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2025.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xiii, 448p.
500 ## - GENERAL NOTE
General note Learn to enhance your organization’s cybersecurit y through the NIST Cybersecurit y Framework in this invaluable and accessible guide<br/><br/>The National Institute of Standards and Technology (NIST) Cybersecurity Framework, produced in response to a 2014 US Presidential directive, has proven essential in standardizing approaches to cybersecurity risk and producing an efficient, adaptable toolkit for meeting cyber threats. As these threats have multiplied and escalated in recent years, this framework has evolved to meet new needs and reflect new best practices, and now has an international footprint. There has never been a greater need for cybersecurity professionals to understand this framework, its applications, and its potential.<br/><br/>A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals.<br/><br/>A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 readers will also find:<br/><br/>Clear, jargon-free language for both beginning and advanced readers<br/>Detailed discussion of all NIST framework components, including Govern, Identify, Protect, Detect, Respond, and Recover<br/>Hundreds of actionable recommendations for immediate implementation by cybersecurity professionals at all levels<br/>A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computing and Processing
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term General Topics for Engineers
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Communication, Networking and Broadcast Technologies
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10896968
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) 004.8 EB0031 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha